Heuristic, pronounced hyoo-ri-stihk, is a Greek term for individually finding or discovering. In computer science, it refers to a method of finding an acceptable solution to a problem in order to continue a process, often searching through data. Usually the solution is a replacement algorithm when an ideal one doesn’t exist.

In computing, heuristics allow professionals to find solutions faster. The advantage of applying a heuristic, such as a search method in a large database, is speed, rather than complete accuracy. However, heuristics in technology are often accurate and strategic. Heuristic-based decisions are based on patterns suggested by data sets.  So while heuristics can arrive at an “answer” more quickly than close analysis of each data point, they will not always deliver  the ideal or perfect solution for a program or computation.

Heuristics are not most efficient for every computational situation. When a solution to a program or problem must always be clear and precise, taking time to calculate the true best solution is often the more efficient choice, such as applications that require an exact, ideal computation. But often, heuristics save time by permitting a quick search or next step to be made. They are used in some artificial intelligence applications when an exact algorithm is unknown.

Heuristics in databases

Searching through large databases can take a large amount of time, which is why heuristics are helpful for data scientists who need to find good search results. Heuristic approaches in database searches attempt to make searches more efficient through speed, reducing the number of queries that must be made.

Heuristic analysis

Heuristic analysis is used by antivirus tools to search through files for possible viruses or malicious traffic. Heuristic analysis will not identify every threat perfectly, but it’s still a method for catching potential threats. Heuristic analysis uses continuously updated databases of known or emerging trends in virus and security risks to identify potential viruses within files. Once tagged, the tool quarantines those files from the system until a user can identify them as legitimate or malicious.


Jenna Phipps
Jenna Phipps
Jenna Phipps is a writer for Webopedia.com, Enterprise Storage Forum, and CIO Insight. She covers data storage systems and data management, information technology security, and enterprise software solutions.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...


SHA-256 is an algorithm used for hash functions and is a vital component...

Document Management System

A document management system is an automated software solution businesses and organizations use...

Conti Ransomware

Conti ransomware first emerged in 2020. It uses a ransomware as a service...